Visible to the public Research on Security Protection Technology System of Power Internet of Things

TitleResearch on Security Protection Technology System of Power Internet of Things
Publication TypeConference Paper
Year of Publication2019
AuthorsGao, Peng, Yang, Ruxia, Shi, Congcong, Zhang, Xiaojian
Conference Name2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)
Date Publishedmay
Keywordsapplication layer cloud fog security management, application security risks, authentication, authority control, cloud computing, Computer architecture, computer network management, computer network security, data communication, data transmission protection, edge area autonomy, edge computing, fog calculation, Fog Computing, Human Behavior, Internet, Internet of Things, Metrics, Network security, Network Security Architecture, power engineering computing, power grid transmission, power grids, power Internet of Things, Power system protection, power system security, privacy protection, production links, Protocols, pubcrawl, real-time security monitoring, resilience, Resiliency, Scalability, security, security monitoring, security protection technology system, sensor security, Sensors, terminal identity authentication
Abstract

With the rapid development of Internet of Things applications, the power Internet of Things technologies and applications covering the various production links of the power grid "transmission, transmission, transformation, distribution and use" are becoming more and more popular, and the terminal, network and application security risks brought by them are receiving more and more attention. Combined with the architecture and risk of power Internet of Things, this paper first proposes the overall security protection technology system and strategy for power Internet of Things; then analyzes terminal identity authentication and authority control, edge area autonomy and data transmission protection, and application layer cloud fog security management. And the whole process real-time security monitoring; Finally, through the analysis of security risks and protection, the technical difficulties and directions for the security protection of the Internet of Things are proposed.

DOI10.1109/ITAIC.2019.8785603
Citation Keygao_research_2019